×

Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods

  • US 10,848,523 B2
  • Filed: 06/15/2020
  • Issued: 11/24/2020
  • Est. Priority Date: 06/10/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented data processing method for analyzing data transfers, the method comprising:

  • accessing, by one or more computer processors, a data transfer log entry representing a data transfer between a particular data asset and a second system, the data transfer log entry comprising a network address for the particular data asset and a network address for the second system;

    determining, by one or more computer processors, an identity of the particular data asset based at least in part on the network address for the particular data asset;

    determining, by one or more computer processors, a geographical location of the second system based at least in part on the network address for the second system;

    accessing, by one or more computer processors based at least in part on the identity of the particular data asset, a data map associated with the particular data asset;

    determining, by one or more computer processors based at least in part on the data map, a plurality of authorized geographical locations associated with the particular data asset;

    comparing, by one or more computer processors, the geographical location of the second system to the plurality of authorized geographical locations associated with the particular data asset;

    determining, by one or more computer processors based at least in part on the comparison of the geographical location of the second system to the plurality of authorized geographical locations associated with the particular data asset, that the geographical location of the second system is an unauthorized geographical location by determining that the geographical location of the second system is not among the plurality of authorized geographical locations associated with the particular data asset;

    at least partially in response to determining that the geographical location of the second system is an unauthorized geographical location, generating, by one or more computer processors, a notification comprising an indication that the geographical location of the second system is an unauthorized geographical location, wherein;

    the data transfer between the particular data asset and the second system has not yet been completed; and

    the method further comprises, at least partially in response to determining that the geographical location of the second system is an unauthorized geographical location, taking one or more actions to stop the data transfer between the particular data asset and the second system before the data transfer has been completed.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×